NIST Computer Security Division
GPTKB entity
Statements (71)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Division
|
gptkbp:aimsTo |
Enhance Security
|
gptkbp:collaboratesWith |
Government Agencies
Industry Academic Institutions |
gptkbp:conducts |
Cybersecurity
Research Cybersecurity Practices |
gptkbp:contributedTo |
National Cybersecurity Strategy
|
gptkbp:developedBy |
Security Governance
Privacy Incident Response Planning |
gptkbp:developer |
Security Assessment
|
gptkbp:develops |
Standards
|
gptkbp:developsStrategiesFor |
Network Architecture
Data Protection Information Assurance IoT Security Software Security Identity_Management |
gptkbp:engagesIn |
Policy Development
Public Outreach Public-Private_Partnerships |
gptkbp:establishedIn |
1972
|
gptkbp:facilitates |
Information Sharing
|
gptkbp:flag |
Data Encryption
|
gptkbp:focusesOn |
Computer Security
|
gptkbp:headquarteredIn |
gptkb:Gaithersburg,_Maryland
|
https://www.w3.org/2000/01/rdf-schema#label |
NIST Computer Security Division
|
gptkbp:isPartOf |
gptkb:U.S._Department_of_Commerce
|
gptkbp:isRecognizedFor |
Network Security
|
gptkbp:issueFeePaid |
System Security
Security Compliance Emerging Threats Cybersecurity Trends Security_Technologies Access_Management |
gptkbp:issues |
gptkb:Federal_Information_Processing_Standards_(FIPS)
|
gptkbp:offers |
Training Programs
|
gptkbp:offersPrograms |
Security Policies
|
gptkbp:offersWorkshopsOn |
Risk Management
|
gptkbp:participatesIn |
Cybersecurity Competitions
|
gptkbp:partOf |
NIST
|
gptkbp:promotes |
Cybersecurity Best Practices
|
gptkbp:provides |
Guidance
Cybersecurity_Effectiveness |
gptkbp:providesGuidanceOn |
Access Control
Threat Modeling Data Breach Response |
gptkbp:providesGuidelinesFor |
Incident Response
Information Security Cloud Security Mobile Security |
gptkbp:providesResourcesFor |
Compliance
Risk Assessment Cybersecurity Framework Security Audits |
gptkbp:providesSupportFor |
Incident Management
Risk Management Framework Cybersecurity_Research |
gptkbp:providesTrainingFor |
Incident Response
Vulnerability Assessment |
gptkbp:publishes |
Special Publications
|
gptkbp:supports |
Cryptography
Federal Agencies Cyber Resilience Supply Chain Security Cyber Threat Intelligence Cybersecurity_Education |
gptkbp:usesTechnology |
State and Local Governments
|
gptkbp:worksWith |
International Organizations
|